Beruflich Dokumente
Kultur Dokumente
Week 2: Authentication
8. Facebook offers to send you emails or text messages when your account is accessed from a
previously unknown machine. These notifications will be triggered when you log in on a new
machine, but also if someone else is using your account details to gain access. Choose which
methods you want to use, then click the Save Changes button.
Figure 11
Introduction to cyber security: stay safe online | 3
Long description
You may be surprised at the range of services and products that provide two-factor authentication.
You’ll consider these in the next activity.
5 Summary of Week 2
Figure 12
Long description
Introduction to cyber security: stay safe online | 4
This week you explored how authentication works and the role of passwords in the operation of
authentication mechanisms.
You learned how weak passwords could threaten the security of digital information and your online
identity. You also learned about different ways of improving your password security, including
techniques for coming up with strong passwords, using password managers and two-factor
authentication.
Of course attacking passwords are not the only way that attackers can gain access to systems. They
can also exploit vulnerabilities in software, making it important that you keep systems up to date with
the latest security fixes/patches. Attackers might also try to execute malicious software, ‘malware’,
on your systems. These topics will be covered in the week ahead.